Skip to content

Commit 4d4f616

Browse files
authored
Merge pull request #231461 from MicrosoftDocs/main
3/20 PM Publish
2 parents c960053 + 2b9f4fe commit 4d4f616

File tree

125 files changed

+23994
-23766
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

125 files changed

+23994
-23766
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
11
{
22
"redirections": [
3-
{
4-
"source_path_from_root": "/articles/azure-monitor/snapshot-debugger/snapshot-debugger-troubleshoot.md",
5-
"redirect_url": "https://learn.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/snapshot-debugger-troubleshoot",
6-
"redirect_document_id": false
7-
},
8-
{
3+
{
94
"source_path_from_root": "/articles/azure-monitor/best-practices.md",
105
"redirect_url": "/azure/azure-monitor/getting-started",
116
"redirect_document_id": false

.openpublishing.redirection.deployment-environments.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,11 @@
1414
"source_path_from_root": "/articles/deployment-environments/tutorial-create-and-configure-projects.md",
1515
"redirect_url": "/azure/deployment-environments/quickstart-create-and-configure-projects",
1616
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/deployment-environments/how-to-configure-use-cli.md",
20+
"redirect_url": "https://aka.ms/CLI-reference",
21+
"redirect_document_id": false
1722
}
1823
]
1924
}

.openpublishing.redirection.dev-box.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@
99
"source_path_from_root": "/articles/dev-box/quickstart-configure-dev-box-project.md",
1010
"redirect_url": "/azure/dev-box/quickstart-configure-dev-box-service",
1111
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/dev-box/cli-reference-subset.md",
15+
"redirect_url": "https://aka.ms/CLI-reference",
16+
"redirect_document_id": false
1217
}
1318
]
1419
}

.openpublishing.redirection.json

Lines changed: 22461 additions & 22450 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/06/2022
11+
ms.date: 03/20/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -17,7 +17,7 @@ ms.reviewer: arvinh
1717

1818
Microsoft Azure AD provides support for user provisioning to third-party SaaS applications such as Salesforce, G Suite and others. If you enable user provisioning for a third-party SaaS application, the Azure portal controls its attribute values through attribute-mappings.
1919

20-
Before you get started, make sure you are familiar with app management and **single sign-on (SSO)** concepts. Check out the following links:
20+
Before you get started, make sure you're familiar with app management and **single sign-on (SSO)** concepts. Check out the following links:
2121
- [Quickstart Series on App Management in Azure AD](../manage-apps/view-applications-portal.md)
2222
- [What is single sign-on (SSO)?](../manage-apps/what-is-single-sign-on.md)
2323

@@ -71,15 +71,15 @@ Along with this property, attribute-mappings also support the following attribut
7171

7272
- **Source attribute** - The user attribute from the source system (example: Azure Active Directory).
7373
- **Target attribute** – The user attribute in the target system (example: ServiceNow).
74-
- **Default value if null (optional)** - The value that will be passed to the target system if the source attribute is null. This value will only be provisioned when a user is created. The "default value when null" will not be provisioned when updating an existing user. If for example, you want to provision all existing users in the target system with a particular Job Title (when it is null in the source system), you can use the following [expression](../app-provisioning/functions-for-customizing-application-data.md): Switch(IsPresent([jobTitle]), "DefaultValue", "True", [jobTitle]). Make sure to replace the "Default Value" with what you would like to provision when null in the source system.
74+
- **Default value if null (optional)** - The value that will be passed to the target system if the source attribute is null. This value will only be provisioned when a user is created. The "default value when null" won't be provisioned when updating an existing user. If for example, you want to provision all existing users in the target system with a particular Job Title (when it's null in the source system), you can use the following [expression](../app-provisioning/functions-for-customizing-application-data.md): Switch(IsPresent([jobTitle]), "DefaultValue", "True", [jobTitle]). Make sure to replace the "Default Value" with what you would like to provision when null in the source system.
7575
- **Match objects using this attribute** – Whether this mapping should be used to uniquely identify users between the source and target systems. It's typically set on the userPrincipalName or mail attribute in Azure AD, which is typically mapped to a username field in a target application.
76-
- **Matching precedence** – Multiple matching attributes can be set. When there are multiple, they're evaluated in the order defined by this field. As soon as a match is found, no further matching attributes are evaluated. While you can set as many matching attributes as you would like, consider whether the attributes you are using as matching attributes are truly unique and need to be matching attributes. Generally customers have 1 or 2 matching attributes in their configuration.
76+
- **Matching precedence** – Multiple matching attributes can be set. When there are multiple, they're evaluated in the order defined by this field. As soon as a match is found, no further matching attributes are evaluated. While you can set as many matching attributes as you would like, consider whether the attributes you're using as matching attributes are truly unique and need to be matching attributes. Generally customers have 1 or 2 matching attributes in their configuration.
7777
- **Apply this mapping**
7878
- **Always** – Apply this mapping on both user creation and update actions.
7979
- **Only during creation** - Apply this mapping only on user creation actions.
8080

8181
## Matching users in the source and target systems
82-
The Azure AD provisioning service can be deployed in both "green field" scenarios (where users do not exist in the target system) and "brownfield" scenarios (where users already exist in the target system). To support both scenarios, the provisioning service uses the concept of matching attributes. Matching attributes allow you to determine how to uniquely identify a user in the source and match the user in the target. As part of planning your deployment, identify the attribute that can be used to uniquely identify a user in the source and target systems. Things to note:
82+
The Azure AD provisioning service can be deployed in both "green field" scenarios (where users don't exist in the target system) and "brownfield" scenarios (where users already exist in the target system). To support both scenarios, the provisioning service uses the concept of matching attributes. Matching attributes allow you to determine how to uniquely identify a user in the source and match the user in the target. As part of planning your deployment, identify the attribute that can be used to uniquely identify a user in the source and target systems. Things to note:
8383

8484
- **Matching attributes should be unique:** Customers often use attributes such as userPrincipalName, mail, or object ID as the matching attribute.
8585
- **Multiple attributes can be used as matching attributes:** You can define multiple attributes to be evaluated when matching users and the order in which they are evaluated (defined as matching precedence in the UI). If for example, you define three attributes as matching attributes, and a user is uniquely matched after evaluating the first two attributes, the service will not evaluate the third attribute. The service will evaluate matching attributes in the order specified and stop evaluating when a match is found.

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/17/2023
11+
ms.date: 03/20/2023
1212
ms.custom: template-tutorial
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/17/2023
11+
ms.date: 03/20/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 12 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/16/2023
7+
ms.date: 03/20/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -94,25 +94,17 @@ Content-Type: application/json
9494

9595
### How does system-preferred MFA determine the most secure method?
9696

97-
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge.
98-
99-
1. Temporary Access Pass
100-
1. Certificate-based authentication
101-
1. FIDO2 security key
102-
1. Microsoft Authenticator notification
103-
1. Companion app notification
104-
1. Microsoft Authenticator time-based one-time password (TOTP)
105-
1. Companion app TOTP
106-
1. Hardware token based TOTP
107-
1. Software token based TOTP
108-
1. SMS over mobile
109-
1. OnewayVoiceMobileOTP
110-
1. OnewayVoiceAlternateMobileOTP
111-
1. OnewayVoiceOfficeOTP
112-
1. TwowayVoiceMobile
113-
1. TwowayVoiceAlternateMobile
114-
1. TwowayVoiceOffice
115-
1. TwowaySMSOverMobile
97+
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge. Click the link for information about each method.
98+
99+
1. [Temporary Access Pass](howto-authentication-temporary-access-pass.md)
100+
1. [Certificate-based authentication](concept-certificate-based-authentication.md)
101+
1. [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
102+
1. [Time-based one-time password (TOTP)](concept-authentication-oath-tokens.md)<sup>1</sup>
103+
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
104+
105+
<sup>1</sup> Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.
106+
<sup>2</sup> Includes SMS and voice calls.
107+
116108

117109
### How does system-preferred MFA affect AD FS or NPS extension?
118110

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,91 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2121

2222
This page is updated monthly, so revisit it regularly.
2323

24+
## February 2023
25+
26+
### General Availability - Filter and transform group names in token claims configuration using regular expression
27+
28+
**Type:** New feature
29+
**Service category:** Enterprise Apps
30+
**Product capability:** SSO
31+
32+
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality will allow those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
33+
34+
---
35+
36+
### General Availability - Filter groups in tokens using a substring match
37+
38+
**Type:** New feature
39+
**Service category:** Enterprise Apps
40+
**Product capability:** SSO
41+
42+
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token.This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature will unblock those challenges.
43+
44+
For more information, see:
45+
- [Group Filter](../develop/reference-claims-mapping-policy-type.md#group-filter).
46+
- [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
47+
48+
49+
50+
---
51+
52+
### General Availability - New SSO claims transformation features
53+
54+
**Type:** New feature
55+
**Service category:** Enterprise Apps
56+
**Product capability:** SSO
57+
58+
Azure AD now supports claims transformations on multi-valued attributes and can emit multi-valued claims. More functions to allow match and string operations on claims processing to enable apps to be migrated from other IdPs to Azure AD. This includes: Match on Empty(), NotEmpty(), Prefix(), Suffix(), and extract substring operators. For more information, see: [Claims mapping policy type](../develop/reference-claims-mapping-policy-type.md).
59+
60+
---
61+
62+
### General Availability - New Detection for Service Principal Behavior Anomalies
63+
64+
**Type:** New feature
65+
**Service category:** Access Reviews
66+
**Product capability:** Identity Security & Protection
67+
68+
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior will be assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity will appear in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
69+
70+
---
71+
72+
### General Availability - Microsoft cloud settings for Azure AD B2B
73+
74+
**Type:** New feature
75+
**Service category:** B2B
76+
**Product capability:** B2B/B2C
77+
78+
Microsoft cloud settings let you collaborate with organizations from different Microsoft Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following clouds:
79+
80+
- Microsoft Azure commercial and Microsoft Azure Government
81+
- Microsoft Azure commercial and Microsoft Azure China 21Vianet
82+
83+
For more information about Microsoft cloud settings for B2B collaboration., see: [Microsoft cloud settings](../external-identities/cross-tenant-access-overview.md#microsoft-cloud-settings).
84+
85+
---
86+
87+
### Public Preview - Support for Directory Extensions using Azure AD cloud sync
88+
89+
**Type:** New feature
90+
**Service category:** Provisioning
91+
**Product capability:** Azure AD Connect Cloud Sync
92+
93+
Hybrid IT Admins now can sync both Active Directory and Azure AD Directory Extensions using Azure AD Cloud Sync. This new capability adds the ability to dynamically discover the schema for both Active Directory and Azure AD, allowing customers to map the needed attributes using Cloud Sync's attribute mapping experience.
94+
95+
For more information on how to enable this feature, see: [Cloud Sync directory extensions and custom attribute mapping](../cloud-sync/custom-attribute-mapping.md)
96+
97+
98+
---
99+
100+
### General Availability - On-premises application provisioning
101+
102+
**Type:** Changed feature
103+
**Service category:** Provisioning
104+
**Product capability:** Outbound to On-premises Applications
105+
106+
Azure AD supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](../app-provisioning/on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](../app-provisioning/on-premises-ldap-connector-configure.md) user store, or a [SQL](../app-provisioning/tutorial-ecma-sql-connector.md) database, Azure AD can support those as well.
107+
108+
---
24109

25110
## January 2023
26111

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,8 @@
234234
href: manage-workflow-tasks.md
235235
- name: Run a workflow on-demand
236236
href: on-demand-workflow.md
237+
- name: Customize emails
238+
href: customize-workflow-email.md
237239
- name: Check the status of a workflow
238240
href: check-status-workflow.md
239241
- name: Check execution user scope

0 commit comments

Comments
 (0)